• 1
  • 10 Steps to Build & Lead a Cybersecurity/CTF Team

    John Hammond
    Sat, 09:00 - 09:50
    Track 2
  • A
  • Actioning ATT&CK

    Jake Liefer
    Fri, 15:00 - 15:50
    Track 2
  • All the Bacon: How Lesley Knope and Ron Swanson encourage community growth

    Kevin Johnson
    Fri, 17:00 - 17:50
    Track 1
  • A Tale of Three Brothers: Three Android Privacy Bugs

    nightwatchcyber
    Fri, 10:30 - 11:20
    Track 2
  • B
  • Building a Cloud Pentest Lab (and how we blew some up)

    Barrett Adams, Chris Myers
    Sat, 15:30 - 16:20
    Track 2
  • Business and the Beast

    Bryan Inagaki
    Fri, 09:00 - 09:50
    Track 1
  • C
  • Cats, Cats, and Moar Katz - Windows Post-Exploitation

    Alex Reuben
    Fri, 14:30 - 14:50
    Track 2
  • Certs vs Degree vs Experience. Which one is the winner?

    Bruce Dennis
    Sat, 16:30 - 16:50
    Track 1
  • Closing Ceremony

     
    Sat, 17:30 - 17:50
    Track 1
  • Comparing Malicious Files

    Robert Simmons
    Fri, 13:00 - 13:50
    Track 2
  • Cryptocurrency as Asymmetric Economic Weapon

    Scott Lyons, Joshua Marpet
    Sat, 13:00 - 13:50
    Track 2
  • CyberSecurity Effectiveness - Do you even security?

    Chris Rossi
    Sat, 09:00 - 09:50
    Track 1
  • D
  • Drone Detection

    Ralph M. DeFrangesco
    Fri, 14:30 - 14:50
    Track 1
  • E
  • Expanding Our Horizons - The Value of Multidisciplinary Knowledge in Security

    Matthew Perrine
    Sat, 13:00 - 13:50
    Track 1
  • “
  • “Fast-track your Cybersecurity/Hacking Career – Why Take The Slow Lane?”

    Joe Klein
    Sat, 15:30 - 16:20
    Track 1
  • H
  • Hacking for Good: The Scary State of AppSec

    Randy Westergren
    Fri, 15:00 - 15:50
    Track 1
  • History of E-waste Recycling

    Matthew Strong
    Fri, 16:00 - 16:50
    Track 1
  • How things work: A deep dive into 1Password security

    David Schuetz
    Fri, 13:00 - 13:50
    Track 1
  • I
  • Introduction to Container Security in Kubernetes

    Jon Mosco
    Sat, 14:30 - 15:20
    Track 2
  • Introduction To Ethical Hacking

    Brandon S. Keath
    Fri, 11:30 - 11:50
    Track 1
  • M
  • MAGIC: Malware Analysis to Generate Important Capabilities

    Sean Kilgallon
    Fri, 11:30 - 11:50
    Track 2
  • My quest for identity in a vendor turmoil

    Nir Yosha
    Fri, 10:30 - 11:20
    Track 1
  • O
  • Open Firetalks

     
    Sat, 10:30 - 10:50
    Track 2
  • Q
  • Quick Picks from Bro/Zeek logs

    Fatema Bannat Wala
    Sat, 10:30 - 10:50
    Track 1
  • S
  • Security Lessons Through the Eyes of Harry Potter

    Krypton3, Zamster
    Sat, 14:30 - 15:20
    Track 1
  • Smile You're on Camera! Controversies in Facial Biometrics

    Dave Vargas
    Sat, 11:00 - 11:50
    Track 2
  • So you wanna start a podcast? Experience from starting Iron Sydadmin

    Gangrif
    Sat, 11:00 - 11:50
    Track 1